Sciweavers

1825 search results - page 37 / 365
» Cryptographic Securities Exchanges
Sort
View
131
Voted
CCS
2009
ACM
16 years 3 months ago
Universally composable contributory group key exchange
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by maliciou...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
161
Voted
CSFW
2009
IEEE
15 years 9 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
119
Voted
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 8 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
125
Voted
INDOCRYPT
2004
Springer
15 years 8 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...
148
Voted
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
15 years 6 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...